General

  • Target

    b95e52b3171cd7d7ed07b0a75ab5d912d7204263b435f2af208f22c06bf05775

  • Size

    101KB

  • Sample

    241120-zn76xasrfs

  • MD5

    447c33f9aab2d4897276e6942d87de3e

  • SHA1

    609ccde3bc76e695be73af250b7491e01de43359

  • SHA256

    b95e52b3171cd7d7ed07b0a75ab5d912d7204263b435f2af208f22c06bf05775

  • SHA512

    9bcf581b5a4f9f2eaef983b7dcf8c2033db62e19bade32c07d44ff93fbe3cd4afc7a31853fc68b833c8fb75339ee7cc564735c8dc03d7976858c48844a53ff92

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Targets

    • Target

      b95e52b3171cd7d7ed07b0a75ab5d912d7204263b435f2af208f22c06bf05775

    • Size

      101KB

    • MD5

      447c33f9aab2d4897276e6942d87de3e

    • SHA1

      609ccde3bc76e695be73af250b7491e01de43359

    • SHA256

      b95e52b3171cd7d7ed07b0a75ab5d912d7204263b435f2af208f22c06bf05775

    • SHA512

      9bcf581b5a4f9f2eaef983b7dcf8c2033db62e19bade32c07d44ff93fbe3cd4afc7a31853fc68b833c8fb75339ee7cc564735c8dc03d7976858c48844a53ff92

    • SSDEEP

      3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks